The present invention relates to a network device and a method for providing content compatibility between network devices having different respective digital rights management methods. The method includes exchanging security program lists of the network devices, comparing the security program list of one network device with the security program list of the other network device based on the exchanged security program lists, and installing a security program required for using content of the other network device according to the comparison result. Accordingly, there is an advantage in that the network devices using the different respective DRM-based security programs can exchange content with one another and use the content of the other network device by using the predetermined security program update methods.
|
1. A network device having a first security program list corresponding to a first digital rights management method, the network device comprising:
a hardware module comprising a security program management module for receiving a second security program list forwarded from another network device, wherein the second security program list corresponds to a second digital rights management method which is different from the first digital rights management method, comparing the received second security program list with the first security program list of the network device, and causing a desired security program necessary for using content of the other network device to be installed into the network device according to the comparing
wherein the security program management module transmits the first security program list to the other network device to use the content of the other network device;
wherein the security program management module transmits an address of a security program server providing the security program registered in the first security program list when forwarding the first security program list to the other network device, and receives an address of a security program server providing the security program registered in the second security program list when receiving the second security program list from the other network device.
6. A method for providing content compatibility between a first network device and a second network device, the method comprising:
(a) exchanging security program lists between the first network device and the second network device, wherein a first device has a first security program list corresponding to a first digital rights management method and wherein a second device has a second security program list corresponding to a second digital rights management method which is different from the first digital rights management method;
(b) comparing the first security program list with the second security program list based on the exchanged security program lists; and
(c) installing a security program required for using content of the second network device and the first network device on the first network device and the second network device respectively, according to the comparing;
wherein (a) comprises transmitting information on an address of a security program server providing the security program registered in the first security program list and information on an address of a security program server providing the security program registered in the second security program list to the second network device and the first network device respectively, together with the first security program list and the second security program list during the exchange.
2. The network device as claimed in
3. The network device as claimed in
4. The network device as claimed in
5. The network device as claimed in
7. The method as claimed in
8. The method as claimed in
requesting the desired security program from the security program server by referring the information on the security program server address; and
downloading the requested security program from the security program server and installing the downloaded program.
9. The method as claimed in
requesting the desired security program by sending information on the security program server address to a local security program server connected to each network device;
causing the local security program server to request the desired security program from a remote security program server corresponding to the server address, to download the desired security program, and to transmit the downloaded security program to each network device; and
installing the transmitted security program into each network device.
10. The method as claimed in
requesting insertion of a predetermined storage device in which the desired security program installed in the second network device is stored; and
receiving and installing the security program after the storage device has been inserted;
wherein the installing a security program required for using content of the first network device comprises:
requesting insertion of a predetermined storage device in which the desired security program installed in the first network device is stored; and
receiving and installing the security program after the storage device has been inserted.
11. The method as claimed in
requesting the desired security program from the second network device; and
downloading the requested security program from the second network device and installing the downloaded security program on the first network device; and
wherein the installing a security program required for using content of the first network device comprises:
requesting the desired security program from the first network device; and
downloading the requested security program from the first network device and installing the downloaded security program on the second network device.
12. The method as claimed in
|
This application claims the priority of Korean Patent Application No. 10-2003-0041979 filed on Jun, 26, 2003, in the Korean Intellectual Property Office, the disclosure of which is incorporated herein by reference.
1. Field of Invention
The present invention relates to a network device and a method for providing content compatibility between network devices having different respective digital rights management methods. More particularly, the present invention enables network devices having different respective digital rights management methods to transfer and use content between them, by using a security program management module for installing into a specific network device a security program required for using content of other network devices having a security program based on a different digital rights management method through a security program update method.
2. Description of the Related Art
Recently, as digital content becomes more widely distributed, various technologies have been actively developed such that reliable distribution environments capable of efficiently protecting against illegal copying of digital content, allowing transaction parties to use digital content in a lawful manner, and making profit from the use of digital content can be provided or established.
Particularly, digital rights management (DRM) has recently attracted public attention. DRM is a system that protects, manages and distributes digital content, and in a wide sense, is also defined as a technique, procedure, processing and program for managing digital rights, including hardware and software for enabling reliable licensing, secure and safe rights and authentication, and reliable environments and infrastructure.
Among the basic functions of DRM, a security technique has been widely used to protect against the illegal distribution of digital content, which can protect the content owner's rights and also provide consumers with easy and legal availability of digital content.
DRM protects digital content transmitted between network devices within one system or other systems connected thereto. In such a case, only the network device having a specific security program complying with the DRM technique is allowed to receive and use the digital content.
Thus, network devices having different respective DRM-based security programs cannot exchange or use digital content with one another.
Referring to
That is, even though a specific network device using a different DRM method has been registered into a network service through an authentication process according to networking techniques, DRM characteristics for managing digital content through domain management and encryption make it impossible for the specific network device to communicate with other network devices.
Thus, there is a problem in that content provided from a broadcasting station 30 or a network device 21 operating on a network 20 connected via the Internet 40 cannot be used, and the content of the network device 11 operating on the same network 10 also cannot be used.
Accordingly, there is still a need for a method by which digital content can be exchanged and used between specified network devices, even though security programs using different DRM methods are employed therein.
A first object of the present invention is to enable content to be transmitted and used between network devices using security programs of different DRM methods by allowing a network management module to update a security program for content used in one network device and install the security program into a network device to which the network management module belongs.
The present invention enables a security program management module installed in a specific network device to install a security program required for using predetermined content of another network device in the specific network device by transmitting a security program list of the specific network device to the other network device, receiving a security program list from the other network device, comparing the received security program list with the security program list of the specific network device, and updating the security program list according to the comparison result.
In addition, the security program management module registers information on the installed security program into the security program list for management of the security program.
The security program list may be updated by updating a desired security program through a predetermined security program update method, e.g. an update method using a security program server, a storage device, another network device or a local security program server.
In the present invention, an operating process is commonly performed for each of the network devices in such a manner that content of one network device is transmitted, a security program list is received from the other network device, the received security program list is compared with a security program list of the one network device, and a desired security program is updated. Therefore, the following descriptions will be made in detail of the operating process conducted in a new network device which connects with a home network, receives a security program list used for data communications from the existing network device, and updates its own security program list of the new network device. The detailed descriptions of the operating process conducted in the existing network device will be omitted.
According to an aspect of the present invention, there is provided a network device, comprising a security program management module for receiving a security program list forwarded from another network device, comparing the received security program list with a security program list of the network device, and causing a desired security program necessary for using content of the other network device to be installed into the network device through a predetermined security program update method according to the comparison result.
According to another aspect of the present invention, there is also provided a method for providing content compatibility between network devices each having different rights management methods, comprising exchanging security program lists of the network devices, comparing the security program list of one network device with the security program list of the other network device based on the exchanged security program lists, and installing a security program required for using content of the other network device according to the comparison result.
The above and other objects, features and advantages of the present invention will become apparent from the following description of exemplary embodiments given in conjunction with the accompanying drawings, in which:
Hereinafter, a network device and a method for providing content compatibility between network devices using different respective digital rights management methods will be described in detail with reference to the accompanying drawings.
In explaining the network device and method for providing content compatibility between network devices using different respective digital rights management methods, content can be used between the network devices using different DRM methods, which are operating on a predetermined network, such as a home network. However, the embodiments herein are non-limiting, and it will be understood by those skilled in the art that various changes and other equivalents may be made to the method capable of using the contents between the network devices having security programs of different DRM methods.
Accordingly, the true scope of the present invention should be construed as being defined by the appended claims.
Referring to
Each of the network devices 110 and 120 corresponds to a home networking device, and includes a security program management module (not shown). That is, when a new network device is installed and connected to the home network 100, the security program management module sends its own security program list to the new network device, receives a security program list from the new network device to compare the received security program list with its own security program list, and then downloads and installs a security program necessary for communication with the new network device according to a predetermined security program update method.
Further, the security program management module registers information on the security program installed in a relevant network device into the security program list and manages the security program.
The security program update method may allow a desired security program to be downloaded from a server or network device having a specific security program. For example, the security program may be updated by a security program server, a storage device, another network device or a local security program server.
According to the security program update method, the security program management module sends the address of a server for providing the desired security program, together with the security program list, so that another network device intended for data communication can easily download the desired security program.
For reference, in the aforementioned security program management module for the network device, the modules may be configured in hardware, software, or a combination thereof.
Therefore, it will fall within the scope and spirit of the present invention that the security program management module for the network device according to the present invention is configured in hardware or software, and it will also be apparent that various changes and modifications can be made thereto without departing from the scope and spirit of the present invention.
Next, the method of providing content compatibility between network devices having different respective DRM methods using the network device according to the present invention will be described in detail with reference to the accompanying drawings.
The method of the present invention comprises exchanging security program lists of the network devices, comparing the security program list of one network device with the security program list of the other network device based on the exchanged security program lists, and installing a security program required for using content of the other network device according to the comparison result.
Further, the method of the present invention further comprises requesting desired content from the other network device and using the desired content received from the other network device, when the security program is installed.
Such operating procedures of the present invention will be described in detail according to the security program update methods that may be classified into methods of updating the security programs by a security program server, storage device, another network device, and a local security program server, respectively.
Therefore, the processing procedures of the present invention will be explained according to the respective aforementioned update methods.
A method for updating a security program through the security program server may comprise requesting a desired security program from a remote security program server, downloading the security program from the server and installing the downloaded security program into a network device requesting the security program.
Referring to
Referring to
After the authentication process has been completed, the network device 110 transmits its own security program list and the address of a security program server to the network device 120 to provide the network device 120 with content used by the network device 110 (S2).
When receiving the security program list of the network device 110 and the address of the security program server from the network device 110, the network device 120 compares its own security program list with the received security program list of the network device (S3).
Based on the comparison, it is determined whether a desired program necessary for using the content of the network device 110 is present in the security program list of the network device 120 (S4).
If it is determined that the desired program necessary for using the content of the network device 110 is not present in the security program list of the network device 120, the network device 120 accesses the security program server 500 using the address of the server received from the network device 110 and requests the desired security program from the security program server 500 (S5).
The security program server 500 retrieves the desired security program requested by the network device 120 and forwards the retrieved security program to the network device 120 (S6). Then, the network device 120 downloads and installs the security program forwarded from the security program server 500, and then, registers the security program in its own security program list (S7).
Thereafter, the network device 120 generates and sends a signal for requesting the network device 110 to transfer desired content (S8).
In response to the signal received from the network device 120, the network device 110 sends the desired content to the network device 120 (S9) which in turn uses the desired content (S10).
On the other hand, if it is determined that the desired program necessary for using the contents of the network device 110 is present in the security program list of the network device 120, the network device 120 requests the network device 110 to transfer the desired content in order to use the desired content received from the network device 110 (S11).
Next, a method for updating the security program using a storage device will be described. Assuming that a certain home network device is sold together with a storage device (for example, a smart card) in which a security program installed into the network device is stored in the form of component software, the security program necessary for using the content of the certain network device can be directly downloaded from the storage device and installed into another network requiring the content.
Referring to
After the authentication process has been completed, the network devices 110 and 120 transmit and receive their own security program lists to and from each other in order to exchange the security program lists with each other ({circle around (2)}).
Then, the network device 120 compares its own security program list with the security program list received from the network device 110 and determines whether a desired security program necessary for using content of the network device 110 is present in its own security program list.
If it is determined that the desired security program is not present in the security program list of the network device 120, a message requesting the desired security program is displayed on a predetermined display means to inform the user that the desired security program is needed.
When the user inserts a storage device 111 of the network device 110 into the network device 120 in response to the displayed message, the network device 120 downloads the desired security program from the inserted storage device 111 and installs the downloaded security program therein.
If it is determined that the desired security program is present or has been installed using the storage device 111, the network device 120 can provide its own desired contents according to the request of the network device 110.
Furthermore, the network device 110 compares its own security program list with the security program list received from the network device 120 and determines whether a desired security program necessary for using contents of the network device 120 is present in its own security program list.
If it is determined that the desired security program is not present in the security program list of the network device 110, a message requesting the desired security program is displayed on a predetermined display means to inform the user that the desired security program is needed.
When the user inserts a storage device 121 of the network device 120 into the network device 110 in response to the displayed message, the network device 110 downloads the desired security program from the inserted storage device 121 and installs the downloaded security program therein.
If it is determined that the desired security program is present or has been installed using the storage device 121, the network device 110 can provide its own desired contents according to the request of the network device 120.
According to the above procedures, each of the network devices 110 and 120 can install the desired security program necessary for performing network communication with each other by using the storage device of the other network device ({circle around (3)}).
Thus, each of the network devices 110 and 120 with the desired security program installed therein can use the content of the other network device.
Next, a method for updating a security program through another network device will be described. According to this method, a specific network device may download a DRM-based security program necessary for using desired content directly from another network device intended for using the desired content and install the required security program therein.
Referring to
After the authentication process has been completed, the network devices 110 and 120 transmit and receive their own security program lists to and from each other in order to exchange the security program lists with each other ({circle around (2)}).
Then, the network device 120 compares its own security program list with the security program list received from the network device 110 and determines whether a desired security program necessary for using content of the network device 110 is present in its own security program list.
If it is determined that the desired program is present in the security program list of the network device 120, a signal requesting the transmission of desired content is sent to the network device 110 so that the desired content received from the network device 110 can be used.
If it is determined that the desired security program is not present, the network device 120 requests the desired security program from the network device 110, installs the security program received from the network device 110, and registers the security program into its own security program list.
Furthermore, the network device 110 also compares its own security program list with the security program list received from the network device 120, and determines whether a desired security program necessary for using contents of the network device 120 is present in its own security program list.
If it is determined that the desired security program is present in the security program list of the network device 110, a signal requesting the transmission of desired contents is sent to the network device 120 so that the desired content received from the network device 120 can be used.
If it is determined that the desired security program is not present, the network device 110 requests the desired security program from the network device 120, installs the security program received from the network device 120, and registers the security program into its own security program list.
According to these procedures, each of the network devices 110 and 120 can exchange and install the desired security program.
Thus, each of the network devices 110 and 120 with the desired security program installed therein can use the content of the other network device.
Next, a method for updating a security program through a local security program server will be described. Assuming that the local security program server is present in the home network, it is configured such that a security program required for using predetermined content through communication between a local security program server and a remote security program server can be installed in a specific network device.
Referring to
After the authentication process has been completed, the network devices 110 and 120 transmit and receive their own security program lists to and from each other in order to exchange the security program lists with each other ({circle around (2)}).
Then, the network device 120 compares its own security program list with the security program list received from the network device 110 and determines whether a desired security program necessary for using content of the network device 110 is present in its own security program list.
If it is determined that the desired program is present in the security program list of the network device 120, a signal requesting the transmission of desired content is sent to the network device 110 so that the desired content received from the network device 110 can be used.
If it is determined that the desired security program is not present, the network device 120 transmits information on the security program server address received from the network device 110 to a local security program server 130 and requests the desired security program from the local server.
Furthermore, the network device 110 also compares its own security program list with the security program list received from the network device 120, and determines whether a desired security program necessary for using contents of the network device 120 is present in its own security program list.
If it is determined that the desired security program is present in the security program list of the network device 110, a signal requesting the transmission of desired content is sent to the network device 120 so that the desired content received from the network device 120 can be used.
If it is determined that the desired security program is not present, the network device 110 transmits information on the security program server address received from the network device 120 to the local security program server 130 and requests the desired security program from the local server.
According to the above procedures, when receiving a request for a desired security program from each of the network devices 110 and 120 ({circle around (3)}), the local security program server 130 requests the desired security program from the remote security program server 500, in response to the request received from the network device 120, by referring to the information on the security program server address ({circle around (4)}), and then receives the desired security program from the remote security program server 500 ({circle around (5)}).
Thereafter, the local security program server 130 sends the received security program to the network device 110 or 120, which in turn installs the desired security program received from the local security program server 130 ({circle around (6)}) and registers the security program into the security program list.
Thus, each of the network devices 110 and 120 with the desired security program installed therein can use the content of the other network device.
According to the present invention, there is an advantage in that the network devices using the different respective DRM-based security programs can exchange content with one another and use the content of the other network device by using the predetermined security program update methods.
Although the present invention has been described in detail in connection with the preferred embodiments of the present invention, it will be apparent to those skilled in the art that various changes and modifications can be made thereto without departing from the spirit and scope of the invention. Thus, simple modifications to the embodiments of the present invention fall within the scope of the present invention.
Patent | Priority | Assignee | Title |
10068098, | Apr 17 2015 | PERIGEE CONVERGENT SOLUTIONS INC | Data storage and access platform with jurisdictional control |
10187389, | Dec 19 2013 | Intel Corporation | Technologies for supporting multiple digital rights management protocols on a client device |
8387154, | Jun 12 2007 | Microsoft Technology Licensing, LLC | Domain management for digital media |
9781113, | Dec 19 2013 | Intel Corporation | Technologies for supporting multiple digital rights management protocols on a client device |
Patent | Priority | Assignee | Title |
5218637, | Sep 07 1987 | ETAT FRANCAIS, REPRESENTE PAR LE MINISTERE DES POSTES, DES TELECOMMUNICATIONS ET DE L ESPACE; TELEDIFFUSION DE FRANCE S A ; U S PHILIPS CORPORATION | Method of transferring a secret, by the exchange of two certificates between two microcomputers which establish reciprocal authorization |
6944776, | Apr 12 1999 | Microsoft Technology Licensing, LLC | System and method for data rights management |
7010808, | Aug 25 2000 | Microsoft Technology Licensing, LLC | Binding digital content to a portable storage device or the like in a digital rights management (DRM) system |
7058606, | Nov 23 1994 | ContentGuard Holdings, Inc. | Method for loaning digital works |
7076805, | Jan 11 2002 | ZAMA INNOVATIONS LLC | Digital data system |
7120250, | Sep 09 2002 | Sony Corporation; Sony Electronics INC | Content distribution for multiple digital rights management |
20020023014, | |||
20020087876, | |||
20030196121, | |||
20040003139, | |||
20040003390, | |||
20040133632, | |||
20040168061, | |||
20040168077, | |||
20040172533, | |||
KR1020020089472, | |||
KR20030027066, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Feb 12 2004 | HAN, HEE-CHUL | SAMSUNG ELECTRONICS CO , LTD | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 015513 | /0758 | |
Jun 24 2004 | Samsung Electronics Co., Ltd. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Mar 20 2012 | ASPN: Payor Number Assigned. |
Mar 23 2015 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Feb 20 2019 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
May 15 2023 | REM: Maintenance Fee Reminder Mailed. |
Oct 30 2023 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Sep 27 2014 | 4 years fee payment window open |
Mar 27 2015 | 6 months grace period start (w surcharge) |
Sep 27 2015 | patent expiry (for year 4) |
Sep 27 2017 | 2 years to revive unintentionally abandoned end. (for year 4) |
Sep 27 2018 | 8 years fee payment window open |
Mar 27 2019 | 6 months grace period start (w surcharge) |
Sep 27 2019 | patent expiry (for year 8) |
Sep 27 2021 | 2 years to revive unintentionally abandoned end. (for year 8) |
Sep 27 2022 | 12 years fee payment window open |
Mar 27 2023 | 6 months grace period start (w surcharge) |
Sep 27 2023 | patent expiry (for year 12) |
Sep 27 2025 | 2 years to revive unintentionally abandoned end. (for year 12) |